Search for "olf" returned 7023 results

Is this the Mobile Gadget World We Created?
32 min

Is this the Mobile Gadget World We Created?

The story of the world's first socially responsible mobile…

Hybrid rocket engines
52 min

Hybrid rocket engines

Design and implementation of rocket engines with two-phase…

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

ChokePointProject - Quis custodiet ipsos custodes?
26 min

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in…

iOS application security
51 min

iOS application security

A look at the security of 3rd party iOS applications

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

Distributed Actor System with Rust
47 min

Distributed Actor System with Rust

Learn about the building blocks of a network application

Talking Behind Your Back
59 min

Talking Behind Your Back

On the Privacy & Security of the Ultrasound Tracking…

The Privacy Workshop Project
48 min

The Privacy Workshop Project

Enhancing the value of privacy in todays students view

10GE monitoring live!
59 min

10GE monitoring live!

How to find that special one out of millions

Adventures in Mapping Afghanistan Elections
52 min

Adventures in Mapping Afghanistan Elections

The story of 3 Ushahidi mapping and reporting projects.

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Eight rollouts a day keeping downtime away
53 min

Eight rollouts a day keeping downtime away

The philosophy of shared space in a development environment

Crouching Powerpoint, Hidden Trojan
53 min

Crouching Powerpoint, Hidden Trojan

An analysis of targeted attacks from 2005 to 2007

Computational Meta-Psychology
61 min

Computational Meta-Psychology

An Artificial Intelligence exploration into the creation of…

"Day 2 Ops" Linux for Kubernetes and Container Workloads
54 min

"Day 2 Ops" Linux for Kubernetes and Container Workloads

Leveraging 10 years of Container Linux experience for…

Generating uniqueness
45 min

Generating uniqueness

How generative art pushes the boundaries of intellectual…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Growing Up Software Development
31 min

Growing Up Software Development

From Hacker Culture to the Software of the Future

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…